Romantic Connection Search Results

News: (Un)Appetizing Valentine's Day Bleeding Heart Cake

Baking extraordinaire Lily Vanilli has made some just-slightly-too-realistic-to-look-yummy bleeding heart cakes for people to give to their respective beaus on Valentine's Day. While it's pretty tricky to get your hands on one made by Lily herself, you can make one yourself if you've got the heart. Check out A Lot on Her Plate's video with Lily to see how to make this so-called "anti-Valentine's Day cake," which also works well for Halloween. To follow along with them, check out the full reci...

How To: Play Chopin Nocturne n.20 in C# minor on piano

If you are looking to improve your classical piano technique then this three part how to video is the place to start. You will learn how to practice and study Chopin's nocturne number 20 in C# minor. This detailed lesson goes over where to place the accents, analyzes the dynamics and legato playing technique. This piano tutorial teaches you the best way to practice it so you can Chopin's nocturne no.20 quickly and easily. This piece is not for beginner students, this lesson is directed to adv...

How To: Use Private Encrypted Messaging Over Tor

Tor is an excellent obfuscation network for web traffic, and while instant messaging over the network is very useful, it can be relatively difficult to configure. In this guide, we'll look at two synchronous communications platforms (instant messengers) which can be routed over the Tor network, Ricochet and XMPP.

How To: Back-up & compress UMD games on a memory stick

If you’re having trouble getting games on your memory stick, this video will walk you through the steps of just what you will need to do to compress files onto a thumb drive. There are a variety of steps you will have to follow and you’ll have to have a little bit of time to wait for your game to compress but the effort is well worth it.

How To: Build a MAME bar-top arcade cabinet for under $100

Part of the process is to create plans to follow when making the cabinet for the arcade game. when cutting the wood you need to allow for the 1/8th of an inch that the band saw will be cutting. You will also need a piece of plexi glass to give the game an authentic feel, spray paint the piece of plexi. You will also need joysticks and buttons, which you can get at happcontrol.com. You need to cut a square hole in the plexi so that the buttons can be mounted in it. To integrate the buttons you...

How To: Add a new album and photos to your Facebook page

First log into your Facebook account and sign in. Then when you sign in click under your "profile". You will be redirected to another page. This will be your main page, with all of your information that you have put in and what not. Next click on 'Photos'. It will take you to another page. Once in your in there, you will click on 'create a photo album'. You need to name the new album and then create album. Next it will ask the location of the files. It will be located on your computer. Usuall...

How To: Use the Ribbon and Backstage view in MS Outlook 2010

After you launch Outlook 2010 in your computer, you will see the Ribbon strip immediately in the main window. The button for writing a new e-mail is separated from a button for creating new items in the calendar, contact list or task manager. An independent Quick Steps section offers functions allowing you to move a message into different folders, to save it into a calendar as a meeting reminder, to quickly forward it to a chosen person or to more people and to forward it with a FYI note. If ...

How To: Join a data center for your Mac Mini server

How to Use Your Mac as a Server: Turn your Mac Mini into a server! Yes, that's right, with a little know-how and a little spunk, you can turn an inexpensive Mac Mini computer into a server to provide services over you network. You won't even need the Mac OS X Server, just the Mac OS X Client, so there is no extra software to buy, just the Mac Mini and it's operating system.

How To: Create an SSH tunnel for your Mac Mini server

How to Use Your Mac as a Server: Turn your Mac Mini into a server! Yes, that's right, with a little know-how and a little spunk, you can turn an inexpensive Mac Mini computer into a server to provide services over you network. You won't even need the Mac OS X Server, just the Mac OS X Client, so there is no extra software to buy, just the Mac Mini and it's operating system.

How To: You Can Block Any App from Using Up Your iPhone's Precious Mobile Data by Doing This

If you have a limited mobile data plan on your iPhone, you know how tricky it can be to stay within your given allotment. Large app installs and updates, 4K resolution videos, and photo backups can waste precious data resources in no time. And apps like Apple News, Facebook, Mail, and Netflix eat data like it's candy. But you can nip the problem in the bud by restricting data hogs from your cellular network.

How To: Spy on SSH Sessions with SSHPry2.0

SSH, or the secure shell, is a way of controlling a computer remotely from a command-line interface. While the information exchanged in the SSH session is encrypted, it's easy to spy on an SSH session if you have access to the computer that's being logged in to. Using a tool called SSHPry, we can spy on and inject commands into the SSH sessions of any other user logged in to on the same machine.

How To: Hack UnrealIRCd Using Python Socket Programming

UnrealIRCd is an open-source IRC server that has been around since 1999 and is perhaps the most widely used one today. Version 3.2.8.1 was vulnerable to remote code execution due to a backdoor in the software. Today, we will be exploiting the vulnerability with Metasploit, examining the underlying code to understand it, and creating our own version of the exploit in Python.

How To: Use Command Injection to Pop a Reverse Shell on a Web Server

Command injection is a technique used by hackers to execute system commands on a server, usually via a web application or some kind of GUI. This can happen when an application provides some sort of functionality to the user involving the use of system commands. When the input is not properly sanitized, commands not originally intended to be run are allowed to be executed.

How To: 7 Tips for Securing a Red iPhone 8 Before They Sell Out

Apple has introduced a special edition iPhone 8 and 8 Plus to bring attention to the ongoing worldwide battle against AIDS. As the second iPhones to carry the (PRODUCT)RED name, these rare iPhones may quickly sell out when preorders open up on Tuesday, April 10, at 5:30 a.m. (PDT), so we'll go over some tips to help you secure a red iPhone before it's gone.

How To: Diagnose Your Car's Check Engine Light Using an Android Phone

Whether you're a professional mechanic, a hobbyist, or someone who just wants to know why their check engine light came on, your Android device and an OBD-II adapter can provide insight as to what's going on with your car. Most adapters sell for less than $10, and once you plug it into your vehicle, you'll just need a good app to help you make sense of all the data it can gather.